程序代写代做代考 algorithm database Your student Number

Your student Number
Introduction to computer Security Coursework – G6077

Contents
Your student Number 1
Introduction to computer Security Coursework – G6077 1
Task1 5marks 3
Task2 5marks 4
Task3 5marks 5
Task 4 6
i) Implement your own algorithm that perform single or other levels of frequency analysis [5 marks] 6
ii) Algorithm works [2 marks] 6
iii) At-least 8 words have been decrypted [4 marks] 6
iv) Algorithm is structured well [4 marks] 6
Task 5 7
(i) Registration form and login 7
a) Registration Form 1marks 7
b) Registration Check 1 marks 7
c) Database table 1 mark 7
d) Screenshot of table before and after successful user registration 7
e) Login form and check scripts 3 marks 7
f) Test screen shot of login 7
g) Security. It will be checked from your screenshots of code [9 marks] 7
(ii) Updating password 7
a) Updating password form and check. [4 marks] 7
b) Test screen shots of updating password before and after. 7
c) Security. It will be checked from your screenshots of code [11 marks] 7
(iii) Reasons of i and ii are secure. 7
(iv) Deeper understanding and beyond 7
a) 7
b) 8
c) 8
Task 6) Documentation [5 marks] 9

Task1 5marks
Your answer or not attempted [If you don’t attempt any question, leave the comment Not attempted]

RAT
Botnets
1

2

3

4

5

Task2 5marks
Not attempted [If you don’t attempt any question, leave the comment not attempted]

Weakness
Improvement
1

2

3

4

5

Task3 5marks
Not attempted [If you don’t attempt any question, leave the comment Not attempted]

Task 4
Not attempted [If you don’t attempt any question, leave the comment Not attempted]

• Implement your own algorithm that perform single or other levels of frequency analysis [5 marks]

• Algorithm works [2 marks]
Outputs of algorithm

• At-least 8 words have been decrypted [4 marks]

• Algorithm is structured well [4 marks]

Task 5
Not attempted [If you don’t attempt any question or its sub question, leave the comment Not attempted] or list screenshots of output and code below

• Registration form and login
• Registration Form 1marks
• Registration Check 1 marks
• Database table 1 mark
• Screenshot of table before and after successful user registration
• Login form and check scripts 3 marks
• Test screen shot of login
• Security. It will be checked from your screenshots of code [9 marks]

• Updating password
• Updating password form and check. [4 marks]
• Test screen shots of updating password before and after.
• Security. It will be checked from your screenshots of code [11 marks]

• Reasons of i and ii are secure.

• Deeper understanding and beyond
For any area to be consider for marking, it needs to make application secure, must be significant and student should have extended the boundary of knowledge to do it themselves.

a)
Implementation evidence must be provided in full and in proper order + Video will be checked as well
Reasons + attacks
• Reason 1
• Reason 2
• Reason 3

b)
Implementation evidence must be provided in full and in proper order + Video will be checked as well
Reasons + attacks
• Reason 1
• Reason 2
• Reason 3

c)
Implementation evidence must be provided in full and in proper order + Video will be checked as well
Reasons + attacks
• Reason 1
• Reason 2
• Reason 3

Task 6) Documentation [5 marks]
i) Using template correctly [ 1 mark]
ii) Recording video of task 5 explaining all aspects [2 marks]
[It should be uploaded to one drive and its link will be provided here]
Task 5 will not be assessed if video is not provided.
iii) Fill in the self-assessment column in the form below [2 marks]

Evidence and marking scheme list
Self-assessment marks/
Mark your own effort.
Task 1/5marks
Five significance differences are listed. [1 mark for each]

Task 2/5marks
Five important weaknesses and five improvements.
[1/2 mark for each]

Task 3/5marks
All the steps shown, and correct values are given.
[1 mark for correct answer while 4 for the steps]

Task 4 / 15 marks
• Implement your own algorithm that perform single or other levels of frequency analysis [5 marks]
• Algorithm works [2 marks]
• At-least 8 words have been used [4 marks]
• Algorithm is structured well [4 marks]

Task 5 /

I = 15 marks
II= 15marks
III 5marks
IV 30 marks

• Registration Form [1mark]
• Registration Check [1 mark]
• Database table [1 mark]
• Screenshot of table before and after successful user registration
• Login form and check scripts [3 marks]
• Test screen shot of login
• Security. It will be checked from your screenshots of code [9 marks]
• Updating password
• Updating password form and check. [4 marks]
• Test screen shots of updating password before and after.
• Security. It will be checked from your screenshots of code
[11 marks]
• Reasons of i and ii are secure.
• Reasons for (i) 3 marks
• Reasons for (ii) 2 marks
• Deeper understanding and beyond
For any area to be consider for marking in this section, it needs to make
• application secure
• must be significant
• student should have extended the boundary of knowledge beyond.

Task 6 / 5marks

Total self-assessed marks